SlideShare uma empresa Scribd logo
1 de 33
Baixar para ler offline
© 2016 Quick Heal Technologies Ltd.
WEBINAR
6 Tips to ProtectYour
Kids from
Cyberbullying
© 2016 Quick Heal Technologies Ltd.
Did You Know?
India ranks 3rd on
Global
Cyberbullying
List.[1]
[1]. http://www.endcyberbullying.org/india-ranks-third-on-global-cyber-bullying-list/
[2] Image credit: dailyparent.com
[2]
© 2016 Quick Heal Technologies Ltd.
Topics of
DISCUSSION
© 2016 Quick Heal Technologies Ltd.
What is
cyberbullying?
#1.
© 2016 Quick Heal Technologies Ltd.
Effects of
cyberbullying
#2.
© 2016 Quick Heal Technologies Ltd.
Tips for parents to
protect their kids
from cyberbullying
#3.
© 2016 Quick Heal Technologies Ltd.
How Quick Heal
helps
#4.
© 2016 Quick Heal Technologies Ltd.
What is
Cyberbullying?
© 2016 Quick Heal Technologies Ltd.
Definition:
Cyberbullying is defined as “the use of
electronic communication to bully a person,
typically by sending messages of an
intimidating or threatening nature.”
© 2016 Quick Heal Technologies Ltd.
In other words,
cyberbullying can be…
© 2016 Quick Heal Technologies Ltd.
Harassment
Image credit: http://cybersafetycampaign2015.blogspot.in/2015/07/5-different-types-of-cyberbullying.html
- involves the bully sending offensive and
malicious messages.
© 2016 Quick Heal Technologies Ltd.
Flaming
Image credit: http://www.lifo.gr/now/society/76070
- bullying the victim in front of others by using
harsh languages.
© 2016 Quick Heal Technologies Ltd.
Exclusion
Image credit: https://annablogia.wordpress.com/2013/03/01/belong-or-perish/
- leaving out someone from a group.
© 2016 Quick Heal Technologies Ltd.
Masquerading
- harassing the victim by using a fake identity.
© 2016 Quick Heal Technologies Ltd.
Effects of
Cyberbullying
© 2016 Quick Heal Technologies Ltd.
Cyberbullying can have many negative implications on
the victim. It not only affects the academic career of
children but also adversely impacts their physical,
social, and mental well-being.
© 2016 Quick Heal Technologies Ltd.
Cyberbullying can cause…
© 2016 Quick Heal Technologies Ltd.
Low self-esteem
Withdrawal from family and
friends
Depression,
Anger,
Feeling of loneliness…
Drop in grades and
performance Use of
drugs
© 2016 Quick Heal Technologies Ltd.
What Can Parents do to protect
their kids from
Cyberbullying?
© 2016 Quick Heal Technologies Ltd.
Get ‘INVOLVED’
TIP #1.
in what your kids do on the Internet.
© 2016 Quick Heal Technologies Ltd.
LISTEN
TIP #2.
to their distress signals.
© 2016 Quick Heal Technologies Ltd.
TIP #3.
Don’t BLAME
them for other’s behavior.
© 2016 Quick Heal Technologies Ltd.
EDUCATE
What is Cyberbullying?
Why is it dangerous?
What can be done?
TIP #4.
them about cyberbullying.
© 2016 Quick Heal Technologies Ltd.
TIP #5.
ENCOURAGE
them to find better and safer things to indulge in.
© 2016 Quick Heal Technologies Ltd.
TIP #6.
Collect EVIDENCE
against the bully.
© 2016 Quick Heal Technologies Ltd.
How Quick Heal
helps
© 2016 Quick Heal Technologies Ltd.
Quick Heal has always taken a strong stance against
cyberbullying. Its Parental Control feature is one of the
simple ways with which parents can ensure that their
kids use the Internet constructively without getting
exposed to any of its dangers like cyberbullying or
getting connected to dangerous people.
© 2016 Quick Heal Technologies Ltd.
With Quick Heal Parental Control, parents can:
Block inappropriate website
categories such as chat, social
media, dating, violence, adult, etc.
© 2016 Quick Heal Technologies Ltd.
With Quick Heal Parental Control, parents can:
Block specific sites which you may
feel are not right for your children.
© 2016 Quick Heal Technologies Ltd.
With Quick Heal Parental Control, parents can:
Schedule fixed days and timings
when your kids can access the
Internet at home.
© 2016 Quick Heal Technologies Ltd.
We also have a Facebook page where we share
useful tips and updates about computer security
and especially Internet Safety for kids and
teenagers. It can be visited at:
http://bit.ly/QHSafe
© 2016 Quick Heal Technologies Ltd.
Write to us at
CorporateCommunications@quickheal.co.in
Follow us on
Facebook: www.facebook.com/quickhealav
Twitter: www.twitter.com/quickheal
Google Plus: bit.ly/QuickHealGooglePlus
YouTube: www.youtube.com/quickheal
SlideShare: http://www.slideshare.net/QuickHealPPTs
Visit us
Website: www.quickheal.com
Official Blog: blogs.quickheal.com
Got any queries regarding this
webinar?
© 2016 Quick Heal Technologies Ltd.
Content sources:
https://www.legalshield.com/blog/8-tips-protect-your-kids-cyberbullying
http://www.crosswalk.com/family/parenting/teens/how-to-protect-your-children-from-cyberbullying.html
http://familyinternet.about.com/od/computingsafetyprivacy/tp/stop_cyberbullies.htm
www.endcyberbullying.org/5-different-types-of-cyberbullying/
Thank You.

Mais conteúdo relacionado

Destaque

Local+Mobile+Video presentation for the 2015 Law Management Section conference
Local+Mobile+Video presentation for the 2015 Law Management Section conferenceLocal+Mobile+Video presentation for the 2015 Law Management Section conference
Local+Mobile+Video presentation for the 2015 Law Management Section conferenceConscious Solutions
 
Fairfax County Youth Survey School Year 2013-2014: Bullying and Cyberbullying
Fairfax County Youth Survey School Year 2013-2014: Bullying and CyberbullyingFairfax County Youth Survey School Year 2013-2014: Bullying and Cyberbullying
Fairfax County Youth Survey School Year 2013-2014: Bullying and CyberbullyingFairfax County
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullyingbl03cook
 
5 Common Myths that Stop People from Using an Antivirus
5 Common Myths that Stop People from Using an Antivirus5 Common Myths that Stop People from Using an Antivirus
5 Common Myths that Stop People from Using an AntivirusQuick Heal Technologies Ltd.
 

Destaque (9)

Mc3053
Mc3053Mc3053
Mc3053
 
Local+Mobile+Video presentation for the 2015 Law Management Section conference
Local+Mobile+Video presentation for the 2015 Law Management Section conferenceLocal+Mobile+Video presentation for the 2015 Law Management Section conference
Local+Mobile+Video presentation for the 2015 Law Management Section conference
 
Fairfax County Youth Survey School Year 2013-2014: Bullying and Cyberbullying
Fairfax County Youth Survey School Year 2013-2014: Bullying and CyberbullyingFairfax County Youth Survey School Year 2013-2014: Bullying and Cyberbullying
Fairfax County Youth Survey School Year 2013-2014: Bullying and Cyberbullying
 
Data Security in Healthcare
Data Security in HealthcareData Security in Healthcare
Data Security in Healthcare
 
30 Killer Internet Security Tips
30 Killer Internet Security Tips30 Killer Internet Security Tips
30 Killer Internet Security Tips
 
Is Antivirus (AV) Dead or Just Missing in Action
Is Antivirus (AV) Dead or Just Missing in Action Is Antivirus (AV) Dead or Just Missing in Action
Is Antivirus (AV) Dead or Just Missing in Action
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying Presentation
Cyberbullying PresentationCyberbullying Presentation
Cyberbullying Presentation
 
5 Common Myths that Stop People from Using an Antivirus
5 Common Myths that Stop People from Using an Antivirus5 Common Myths that Stop People from Using an Antivirus
5 Common Myths that Stop People from Using an Antivirus
 

Semelhante a 6 Tips to Protect Your Kids from Cyberbullying

INTRODUCTION TO ONLINE SAFETY ( MAJORS )
INTRODUCTION TO ONLINE SAFETY ( MAJORS )INTRODUCTION TO ONLINE SAFETY ( MAJORS )
INTRODUCTION TO ONLINE SAFETY ( MAJORS )MAHIRA
 
September 2019 part 9
September 2019 part 9September 2019 part 9
September 2019 part 9seadeloitte
 
Cyber Civil Defense - Risk Masters - Allan Cytryn
Cyber Civil Defense - Risk Masters - Allan CytrynCyber Civil Defense - Risk Masters - Allan Cytryn
Cyber Civil Defense - Risk Masters - Allan CytrynBoston Global Forum
 
Social media Risk Management Presentation Sample (Animations don't work in sl...
Social media Risk Management Presentation Sample (Animations don't work in sl...Social media Risk Management Presentation Sample (Animations don't work in sl...
Social media Risk Management Presentation Sample (Animations don't work in sl...Alexander Larsen
 
Cyber Bullying & How to Stay Safe Online.pdf
Cyber Bullying & How to Stay Safe Online.pdfCyber Bullying & How to Stay Safe Online.pdf
Cyber Bullying & How to Stay Safe Online.pdfRahil Foundation
 
safeguard children from cyber bullying.pdf
safeguard children from cyber bullying.pdfsafeguard children from cyber bullying.pdf
safeguard children from cyber bullying.pdfsuerinz9603
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenshipInas Hafi
 
Eskwela module 3_responsible use of ict
Eskwela module 3_responsible use of ictEskwela module 3_responsible use of ict
Eskwela module 3_responsible use of ictAnwar Jesus Esperida
 
Connecticut 2017 best practices in social media
Connecticut 2017 best practices in social mediaConnecticut 2017 best practices in social media
Connecticut 2017 best practices in social mediaMarina London
 
Cybercrimes (Against Children)
Cybercrimes (Against Children)Cybercrimes (Against Children)
Cybercrimes (Against Children)Can R. PAHALI
 
54 Parents Worried About Cyber Bullying ofKids Norton Re.docx
54 Parents Worried About Cyber Bullying ofKids Norton Re.docx54 Parents Worried About Cyber Bullying ofKids Norton Re.docx
54 Parents Worried About Cyber Bullying ofKids Norton Re.docxblondellchancy
 
54 Parents Worried About Cyber Bullying ofKids Norton Re.docx
54 Parents Worried About Cyber Bullying ofKids Norton Re.docx54 Parents Worried About Cyber Bullying ofKids Norton Re.docx
54 Parents Worried About Cyber Bullying ofKids Norton Re.docxBHANU281672
 
Project Plan CreationInclude the following components in an M.docx
Project Plan CreationInclude the following components in an M.docxProject Plan CreationInclude the following components in an M.docx
Project Plan CreationInclude the following components in an M.docxbriancrawford30935
 

Semelhante a 6 Tips to Protect Your Kids from Cyberbullying (20)

INTRODUCTION TO ONLINE SAFETY ( MAJORS )
INTRODUCTION TO ONLINE SAFETY ( MAJORS )INTRODUCTION TO ONLINE SAFETY ( MAJORS )
INTRODUCTION TO ONLINE SAFETY ( MAJORS )
 
How much should you reveal on social media
How much should you reveal on social mediaHow much should you reveal on social media
How much should you reveal on social media
 
Social Media Awareness
Social Media AwarenessSocial Media Awareness
Social Media Awareness
 
September 2019 part 9
September 2019 part 9September 2019 part 9
September 2019 part 9
 
Digital Citizenship Flash Card Deck - A Platform for Good
Digital Citizenship Flash Card Deck - A Platform for GoodDigital Citizenship Flash Card Deck - A Platform for Good
Digital Citizenship Flash Card Deck - A Platform for Good
 
5 Essential Security Tips for Startups
5 Essential Security Tips for Startups5 Essential Security Tips for Startups
5 Essential Security Tips for Startups
 
Cyber Civil Defense - Risk Masters - Allan Cytryn
Cyber Civil Defense - Risk Masters - Allan CytrynCyber Civil Defense - Risk Masters - Allan Cytryn
Cyber Civil Defense - Risk Masters - Allan Cytryn
 
Social media Risk Management Presentation Sample (Animations don't work in sl...
Social media Risk Management Presentation Sample (Animations don't work in sl...Social media Risk Management Presentation Sample (Animations don't work in sl...
Social media Risk Management Presentation Sample (Animations don't work in sl...
 
Cyber Bullying & How to Stay Safe Online.pdf
Cyber Bullying & How to Stay Safe Online.pdfCyber Bullying & How to Stay Safe Online.pdf
Cyber Bullying & How to Stay Safe Online.pdf
 
safeguard children from cyber bullying.pdf
safeguard children from cyber bullying.pdfsafeguard children from cyber bullying.pdf
safeguard children from cyber bullying.pdf
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Eskwela module 3_responsible use of ict
Eskwela module 3_responsible use of ictEskwela module 3_responsible use of ict
Eskwela module 3_responsible use of ict
 
Cybersecurity Basics.pptx
Cybersecurity Basics.pptxCybersecurity Basics.pptx
Cybersecurity Basics.pptx
 
Connecticut 2017 best practices in social media
Connecticut 2017 best practices in social mediaConnecticut 2017 best practices in social media
Connecticut 2017 best practices in social media
 
Cybercrimes (Against Children)
Cybercrimes (Against Children)Cybercrimes (Against Children)
Cybercrimes (Against Children)
 
Cybersafey
Cybersafey Cybersafey
Cybersafey
 
1st annual-social-media-risk-index
1st annual-social-media-risk-index1st annual-social-media-risk-index
1st annual-social-media-risk-index
 
54 Parents Worried About Cyber Bullying ofKids Norton Re.docx
54 Parents Worried About Cyber Bullying ofKids Norton Re.docx54 Parents Worried About Cyber Bullying ofKids Norton Re.docx
54 Parents Worried About Cyber Bullying ofKids Norton Re.docx
 
54 Parents Worried About Cyber Bullying ofKids Norton Re.docx
54 Parents Worried About Cyber Bullying ofKids Norton Re.docx54 Parents Worried About Cyber Bullying ofKids Norton Re.docx
54 Parents Worried About Cyber Bullying ofKids Norton Re.docx
 
Project Plan CreationInclude the following components in an M.docx
Project Plan CreationInclude the following components in an M.docxProject Plan CreationInclude the following components in an M.docx
Project Plan CreationInclude the following components in an M.docx
 

Mais de Quick Heal Technologies Ltd.

31 Internet Security Tips on CyberSecurity Month Ocotober
31 Internet Security Tips on CyberSecurity Month Ocotober31 Internet Security Tips on CyberSecurity Month Ocotober
31 Internet Security Tips on CyberSecurity Month OcotoberQuick Heal Technologies Ltd.
 
How a Ransomware Infects your Computer [INFOGRAPHIC]
How a Ransomware Infects your Computer [INFOGRAPHIC]How a Ransomware Infects your Computer [INFOGRAPHIC]
How a Ransomware Infects your Computer [INFOGRAPHIC]Quick Heal Technologies Ltd.
 
Centralized Patch Management - Proven Security Approach for Ransomware Protec...
Centralized Patch Management - Proven Security Approach for Ransomware Protec...Centralized Patch Management - Proven Security Approach for Ransomware Protec...
Centralized Patch Management - Proven Security Approach for Ransomware Protec...Quick Heal Technologies Ltd.
 
Protecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry RansomwareProtecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry RansomwareQuick Heal Technologies Ltd.
 
Seqrite Data Loss Prevention- Complete Protection from Data Theft and Data Loss
Seqrite Data Loss Prevention- Complete Protection from Data Theft and Data LossSeqrite Data Loss Prevention- Complete Protection from Data Theft and Data Loss
Seqrite Data Loss Prevention- Complete Protection from Data Theft and Data LossQuick Heal Technologies Ltd.
 
Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24
Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24
Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24Quick Heal Technologies Ltd.
 
Jnana Sangama Day 1 - National convention for higher education
Jnana Sangama Day 1 - National convention for higher educationJnana Sangama Day 1 - National convention for higher education
Jnana Sangama Day 1 - National convention for higher educationQuick Heal Technologies Ltd.
 

Mais de Quick Heal Technologies Ltd. (20)

Digital Threat Landscape
Digital Threat LandscapeDigital Threat Landscape
Digital Threat Landscape
 
Cybersecurity in Banking Sector
Cybersecurity in Banking SectorCybersecurity in Banking Sector
Cybersecurity in Banking Sector
 
31 Internet Security Tips on CyberSecurity Month Ocotober
31 Internet Security Tips on CyberSecurity Month Ocotober31 Internet Security Tips on CyberSecurity Month Ocotober
31 Internet Security Tips on CyberSecurity Month Ocotober
 
How a Ransomware Infects your Computer [INFOGRAPHIC]
How a Ransomware Infects your Computer [INFOGRAPHIC]How a Ransomware Infects your Computer [INFOGRAPHIC]
How a Ransomware Infects your Computer [INFOGRAPHIC]
 
Next-Gen Security Solution: Gateway Protection
Next-Gen Security Solution: Gateway ProtectionNext-Gen Security Solution: Gateway Protection
Next-Gen Security Solution: Gateway Protection
 
Centralized Patch Management - Proven Security Approach for Ransomware Protec...
Centralized Patch Management - Proven Security Approach for Ransomware Protec...Centralized Patch Management - Proven Security Approach for Ransomware Protec...
Centralized Patch Management - Proven Security Approach for Ransomware Protec...
 
Protecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry RansomwareProtecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry Ransomware
 
Seqrite Data Loss Prevention- Complete Protection from Data Theft and Data Loss
Seqrite Data Loss Prevention- Complete Protection from Data Theft and Data LossSeqrite Data Loss Prevention- Complete Protection from Data Theft and Data Loss
Seqrite Data Loss Prevention- Complete Protection from Data Theft and Data Loss
 
Safeguard your enterprise against ransomware
Safeguard your enterprise against ransomwareSafeguard your enterprise against ransomware
Safeguard your enterprise against ransomware
 
GITEX 2016, Dubai
GITEX 2016, Dubai GITEX 2016, Dubai
GITEX 2016, Dubai
 
Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24
Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24
Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24
 
Maharashtra Cooperative Summit 2016
Maharashtra Cooperative Summit 2016Maharashtra Cooperative Summit 2016
Maharashtra Cooperative Summit 2016
 
Seqrite Hyderabad Meet 2016
Seqrite Hyderabad Meet 2016 Seqrite Hyderabad Meet 2016
Seqrite Hyderabad Meet 2016
 
Seqrite CXO Meet, Ahmedabad, India
Seqrite CXO Meet, Ahmedabad, IndiaSeqrite CXO Meet, Ahmedabad, India
Seqrite CXO Meet, Ahmedabad, India
 
Fonetastic ppt
Fonetastic pptFonetastic ppt
Fonetastic ppt
 
Seqrite Launch Event in Athens, Greece.
Seqrite Launch Event in Athens, Greece.Seqrite Launch Event in Athens, Greece.
Seqrite Launch Event in Athens, Greece.
 
BFSI Leadership Summit, Mumbai
BFSI Leadership Summit, MumbaiBFSI Leadership Summit, Mumbai
BFSI Leadership Summit, Mumbai
 
Jnana Sangama Day 1 - National convention for higher education
Jnana Sangama Day 1 - National convention for higher educationJnana Sangama Day 1 - National convention for higher education
Jnana Sangama Day 1 - National convention for higher education
 
Event S-Mart Milan, Italy - May 2016
Event S-Mart Milan, Italy - May 2016Event S-Mart Milan, Italy - May 2016
Event S-Mart Milan, Italy - May 2016
 
Event S-Mart 2016 Florence, Italy - April 2016
Event S-Mart 2016 Florence, Italy - April 2016Event S-Mart 2016 Florence, Italy - April 2016
Event S-Mart 2016 Florence, Italy - April 2016
 

Último

Best Web Development Agency- Idiosys USA.pdf
Best Web Development Agency- Idiosys USA.pdfBest Web Development Agency- Idiosys USA.pdf
Best Web Development Agency- Idiosys USA.pdfIdiosysTechnologies1
 
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Natan Silnitsky
 
Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)Ahmed Mater
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...OnePlan Solutions
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Hr365.us smith
 
Odoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 EnterpriseOdoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 Enterprisepreethippts
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Andreas Granig
 
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...OnePlan Solutions
 
Xen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfXen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfStefano Stabellini
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作qr0udbr0
 
A healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfA healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfMarharyta Nedzelska
 
PREDICTING RIVER WATER QUALITY ppt presentation
PREDICTING  RIVER  WATER QUALITY  ppt presentationPREDICTING  RIVER  WATER QUALITY  ppt presentation
PREDICTING RIVER WATER QUALITY ppt presentationvaddepallysandeep122
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesŁukasz Chruściel
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxTier1 app
 
Buds n Tech IT Solutions: Top-Notch Web Services in Noida
Buds n Tech IT Solutions: Top-Notch Web Services in NoidaBuds n Tech IT Solutions: Top-Notch Web Services in Noida
Buds n Tech IT Solutions: Top-Notch Web Services in Noidabntitsolutionsrishis
 

Último (20)

Best Web Development Agency- Idiosys USA.pdf
Best Web Development Agency- Idiosys USA.pdfBest Web Development Agency- Idiosys USA.pdf
Best Web Development Agency- Idiosys USA.pdf
 
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
 
2.pdf Ejercicios de programación competitiva
2.pdf Ejercicios de programación competitiva2.pdf Ejercicios de programación competitiva
2.pdf Ejercicios de programación competitiva
 
Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)
 
Odoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 EnterpriseOdoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 Enterprise
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024
 
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
 
Xen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfXen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdf
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作
 
A healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfA healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdf
 
PREDICTING RIVER WATER QUALITY ppt presentation
PREDICTING  RIVER  WATER QUALITY  ppt presentationPREDICTING  RIVER  WATER QUALITY  ppt presentation
PREDICTING RIVER WATER QUALITY ppt presentation
 
Advantages of Odoo ERP 17 for Your Business
Advantages of Odoo ERP 17 for Your BusinessAdvantages of Odoo ERP 17 for Your Business
Advantages of Odoo ERP 17 for Your Business
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New Features
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
 
Buds n Tech IT Solutions: Top-Notch Web Services in Noida
Buds n Tech IT Solutions: Top-Notch Web Services in NoidaBuds n Tech IT Solutions: Top-Notch Web Services in Noida
Buds n Tech IT Solutions: Top-Notch Web Services in Noida
 

6 Tips to Protect Your Kids from Cyberbullying

  • 1. © 2016 Quick Heal Technologies Ltd. WEBINAR 6 Tips to ProtectYour Kids from Cyberbullying
  • 2. © 2016 Quick Heal Technologies Ltd. Did You Know? India ranks 3rd on Global Cyberbullying List.[1] [1]. http://www.endcyberbullying.org/india-ranks-third-on-global-cyber-bullying-list/ [2] Image credit: dailyparent.com [2]
  • 3. © 2016 Quick Heal Technologies Ltd. Topics of DISCUSSION
  • 4. © 2016 Quick Heal Technologies Ltd. What is cyberbullying? #1.
  • 5. © 2016 Quick Heal Technologies Ltd. Effects of cyberbullying #2.
  • 6. © 2016 Quick Heal Technologies Ltd. Tips for parents to protect their kids from cyberbullying #3.
  • 7. © 2016 Quick Heal Technologies Ltd. How Quick Heal helps #4.
  • 8. © 2016 Quick Heal Technologies Ltd. What is Cyberbullying?
  • 9. © 2016 Quick Heal Technologies Ltd. Definition: Cyberbullying is defined as “the use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature.”
  • 10. © 2016 Quick Heal Technologies Ltd. In other words, cyberbullying can be…
  • 11. © 2016 Quick Heal Technologies Ltd. Harassment Image credit: http://cybersafetycampaign2015.blogspot.in/2015/07/5-different-types-of-cyberbullying.html - involves the bully sending offensive and malicious messages.
  • 12. © 2016 Quick Heal Technologies Ltd. Flaming Image credit: http://www.lifo.gr/now/society/76070 - bullying the victim in front of others by using harsh languages.
  • 13. © 2016 Quick Heal Technologies Ltd. Exclusion Image credit: https://annablogia.wordpress.com/2013/03/01/belong-or-perish/ - leaving out someone from a group.
  • 14. © 2016 Quick Heal Technologies Ltd. Masquerading - harassing the victim by using a fake identity.
  • 15. © 2016 Quick Heal Technologies Ltd. Effects of Cyberbullying
  • 16. © 2016 Quick Heal Technologies Ltd. Cyberbullying can have many negative implications on the victim. It not only affects the academic career of children but also adversely impacts their physical, social, and mental well-being.
  • 17. © 2016 Quick Heal Technologies Ltd. Cyberbullying can cause…
  • 18. © 2016 Quick Heal Technologies Ltd. Low self-esteem Withdrawal from family and friends Depression, Anger, Feeling of loneliness… Drop in grades and performance Use of drugs
  • 19. © 2016 Quick Heal Technologies Ltd. What Can Parents do to protect their kids from Cyberbullying?
  • 20. © 2016 Quick Heal Technologies Ltd. Get ‘INVOLVED’ TIP #1. in what your kids do on the Internet.
  • 21. © 2016 Quick Heal Technologies Ltd. LISTEN TIP #2. to their distress signals.
  • 22. © 2016 Quick Heal Technologies Ltd. TIP #3. Don’t BLAME them for other’s behavior.
  • 23. © 2016 Quick Heal Technologies Ltd. EDUCATE What is Cyberbullying? Why is it dangerous? What can be done? TIP #4. them about cyberbullying.
  • 24. © 2016 Quick Heal Technologies Ltd. TIP #5. ENCOURAGE them to find better and safer things to indulge in.
  • 25. © 2016 Quick Heal Technologies Ltd. TIP #6. Collect EVIDENCE against the bully.
  • 26. © 2016 Quick Heal Technologies Ltd. How Quick Heal helps
  • 27. © 2016 Quick Heal Technologies Ltd. Quick Heal has always taken a strong stance against cyberbullying. Its Parental Control feature is one of the simple ways with which parents can ensure that their kids use the Internet constructively without getting exposed to any of its dangers like cyberbullying or getting connected to dangerous people.
  • 28. © 2016 Quick Heal Technologies Ltd. With Quick Heal Parental Control, parents can: Block inappropriate website categories such as chat, social media, dating, violence, adult, etc.
  • 29. © 2016 Quick Heal Technologies Ltd. With Quick Heal Parental Control, parents can: Block specific sites which you may feel are not right for your children.
  • 30. © 2016 Quick Heal Technologies Ltd. With Quick Heal Parental Control, parents can: Schedule fixed days and timings when your kids can access the Internet at home.
  • 31. © 2016 Quick Heal Technologies Ltd. We also have a Facebook page where we share useful tips and updates about computer security and especially Internet Safety for kids and teenagers. It can be visited at: http://bit.ly/QHSafe
  • 32. © 2016 Quick Heal Technologies Ltd. Write to us at CorporateCommunications@quickheal.co.in Follow us on Facebook: www.facebook.com/quickhealav Twitter: www.twitter.com/quickheal Google Plus: bit.ly/QuickHealGooglePlus YouTube: www.youtube.com/quickheal SlideShare: http://www.slideshare.net/QuickHealPPTs Visit us Website: www.quickheal.com Official Blog: blogs.quickheal.com Got any queries regarding this webinar?
  • 33. © 2016 Quick Heal Technologies Ltd. Content sources: https://www.legalshield.com/blog/8-tips-protect-your-kids-cyberbullying http://www.crosswalk.com/family/parenting/teens/how-to-protect-your-children-from-cyberbullying.html http://familyinternet.about.com/od/computingsafetyprivacy/tp/stop_cyberbullies.htm www.endcyberbullying.org/5-different-types-of-cyberbullying/ Thank You.

Notas do Editor

  1. Harassment involves the bully sending offensive and malicious messages to an individual or a group and is often repeated multiple times. Cyberstalking is one form of harassment that involves continual threatening and rude messages, and can lead to physical harassment in the real, offline world.
  2. Flaming is similar to harassment, but it refers to an online fight exchanged via emails, instant messaging or chat rooms. It is a type of public bullying that often directs harsh languages, or images to a specific person.
  3. Exclusion is the act of intentionally singling out and leaving a person out from an online group such as chats and sites. The group then subsequently leave malicious comments and harass the one they singled out.
  4. Masquerading is a situation where a bully creates a fake identity to harass someone anonymously. In addition to creating a fake identity, the bully can impersonate someone else to send malicious messages to the victim.
  5. The effects of cyberbullying may not be noticeable at first, but the stress factor builds up over time. Many students experiencing cyber bullying feel alone and scared. In most instances, cyber bullying doesn’t start online, but in person. The situation then escalates. Some of the signs of cyber bullying could be: Not wanting to go to school A sharp drop in grades and performance Skipping school Sudden self-esteem issues Complaints of illnesses Use of alcohol or drugs Reluctance to let parents or other family members anywhere near their mobiles, laptops etc Friends disappearing or being excluded from social events Losing weight or changing appearance to try and fit in Fresh marks on the skin that could indicate self-harm and dressing differently such as wearing long sleeved clothes in the summer to hide any marks
  6. By Getting involved we mean join your kids in what they do in their world. Become their companion. One of the best ways to understand what your kids are doing online is to do it, too. Create a Facebook page and add your kids as "friends." It's no different than expecting to meet your kids friends and dates. You'll be able to see what your kids are posting and what type of response they may be getting. Besides, you might have fun as well.
  7. Half of any worldly problem can be solved only by listening about it. Children are made to let out signals when they are in distress. They may withdraw from family and friends, become increasingly angry, moody and sullen or start acting out. And, yes, this is normal teen behavior! Even so, these are all cries for help. It is important that parents pay attention to these signals as they arise because they may be signs that something bigger is going on. Speak to them, ask them what’s troubling them.
  8. Wounding a wounded never helps. Never blame your child for other’s behavior, regardless of how the situation originated. It is vital that your child feels safe at home from these attacks. Make it clear to your child that everything that is happening has to do with the bully’s issues, not with theirs. Try to make this attacks a positive experience for your relationship with your children. 
  9. You cannot fight an enemy without learning about them. Make sure your kids understand what cyberbullying is and why it’s dangerous. Ask them what they would do if they found themselves on the receiving end, and encourage them to think about how the victims might feel. Have your kids name some adults they could turn to for help and let them know that it’s OK if they don’t feel comfortable coming directly to you. The important thing is that they find someone who can support them and get any help they may need.
  10. Help your kids find safe things to do online and positive ways to express their identity and creativity. Rather than engaging in social networking sites, some kids might like designing video games, composing music, exploring digital photography or creating digital art. In additional, encourage them to take on activities offline, such as clubs, church groups and sports. Remember that the draw of chats and social networking is the ability to connect with other people, so help them find positive ways to make the same connections.
  11. Unfortunately, many bullying cases start small and then become worse over time. It is important that you keep records of all offending content (messages, videos, images, etc.) in case the abuse becomes worse and you want authorities to get involved. When malicious behavior is demonstrated with evidence, it is easier for authorities to respond.